Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for managing WPI cipher key in 802.11 chips

A key and chip technology, applied in the field of managing WPI keys in 802.11 chips, can solve problems such as occupying a large storage space, achieve efficient acquisition, realize pipeline processing, and reduce the effect of on-chip cache

Inactive Publication Date: 2008-01-30
BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the BSS / IBSS design capacity is large, it will take up a lot of storage space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for managing WPI cipher key in 802.11 chips
  • Method and device for managing WPI cipher key in 802.11 chips

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] specific implementation plan

[0065] Please refer to Figure 2, which depicts the structure of an 802.11 MAC system that implements the WPI function.

[0066] Realize that the parts of the 802.11 MAC system with WPI function include: an 802.11 MAC hardware, responsible for realizing the 802.11MAC protocol; an off-chip memory, used to store data, in the present invention, the unicast key table and the multicast key table stored here. In the 802.11 MAC device, a WPI-related register group is included to realize the storage and state storage of the WPI key; a WPI encryption and decryption module is included for WPI encryption and decryption; an 802.11 protocol module is included for processing the protocol; Also contains some other modules.

[0067] The unicast key table, multicast key table, WPI related register group, member index table and key table base address on the IO interface together constitute the WPI key management module.

[0068] Please refer to FIG. 3 , w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device used for effectively managing WPI secrete key in an 802.11 MAC hardware. A secrete key needed in WPI process comprises an encryption secrete key and a calibration secrete key. When MPDU is encrypted and decrypted, a data grouping number PN attached to the secrete key is needed; WPI secrete key can be updated during processing, PN is also needs to be updated during updating; an old secrete key is invalidated only after a new secrete key is activated; as STA, in the basic structure BSS, MAC hardware only needs to store the secrete key of the MAC but in IBSS or when MAC hardware works as AP, all STA secrete keys and PN in network need to be managed. When the secrete key is updated, two secrete keys and PN are simultaneously kept for the STA. When the data protected by WPI is received or sent, the data needs to be cached till the needed secrete key and the PN are got. The invention resolves the problem that MAC hardware must effectively manage a great amount of WPI secrete keys, thus avoiding occupying memory inside tablets, storing and getting the secrete key in a simple and quick way, realizing fluidization processing of data, reducing cashing inside tablets and decreasing realization difficulty and cost.

Description

technical field [0001] The invention relates to the field of wireless network communication, in particular to a method and device for managing WPI keys in 802.11 chips. Background technique [0002] my country put forward the national standard GB15629.11 of WLAN in May 2003, which is the only approved agreement in this field in our country. The standard includes a new WAPI (WLAN Authentication and Privacy Infrastructure) security mechanism, which consists of two parts: WAI (WLAN Authentication Infrastructure) and WPI (WLAN Privacy Infrastructure). The transmitted data is encrypted. [0003] WAI adopts the public key cryptographic system and uses certificates to authenticate STAs and APs in the WLAN system. After the identity of STA and AP are authenticated successfully, the two parties will conduct key negotiation, and carry out the WPI process according to the negotiated key. [0004] The WAPI specification defines three entities: [0005] 1) Authenticator Entity AE (Au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 梅张雄兰天
Owner BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products